{"id":2110,"date":"2020-06-15T12:00:54","date_gmt":"2020-06-15T12:00:54","guid":{"rendered":"https:\/\/www.regdata.ch\/solutions\/by-type-of-service\/data-value\/"},"modified":"2022-01-31T17:18:25","modified_gmt":"2022-01-31T17:18:25","slug":"data-value","status":"publish","type":"page","link":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/","title":{"rendered":"Data Value"},"content":{"rendered":"<div><a href=\"\/en\/product\/by-type-of-service#s03\"><img decoding=\"async\"  class=\"alignnone\" src=\"\/wp-content\/uploads\/2020\/09\/fleche_retour.png\" alt=\"\" style=\"width:25px;\"  \/> <span style=\"font-size:0.7em;padding-left:5px\">Back<\/span><\/a><\/div>\n<h1>Data Value<\/h1>\n<div>\n<ul>\n<li>Consent management<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Processing purpose management<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Secure mass processing in compliance with data protection laws<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Secure mass processing performance<\/li>\n<\/ul>\n<\/div>\n<hr>\n<div>\n<p style=\"text-align: justify;\">The following are the different protection techniques used to ensure that sensitive personal data is not identified during mass processing:<\/p>\n<\/div>\n<div>\n<ul>\n<li>Differential anonymization <\/li>\n<li>Homomorphic encryption <\/li>\n<li>Tokenisation and\/or deterministic encryption<\/li>\n<\/ul>\n<\/div>\n<div>\n<div style=\"text-align: justify;\">The analysis processing of unencrypted data by authorised users only (Big Data Scientists, etc.) and within a defined period of time could also be a solution.<\/p>\n<\/div>\n<div style=\"text-align: justify;\">The purpose of the analysis processing and the consent of the data subjects concerned &#8211; if we are talking about sensitive personal data &#8211; will have been defined and obtained beforehand.<\/div>\n<\/div>\n<div>\n<p><div class=\"eds-animate  \" data-eds-entry-animation=\"pop\" data-eds-entry-delay=\"0\" data-eds-entry-duration=\"0.3\" data-eds-entry-timing=\"linear\" data-eds-exit-animation=\"\" data-eds-exit-delay=\"\" data-eds-exit-duration=\"\" data-eds-exit-timing=\"\" data-eds-repeat-count=\"1\" data-eds-keep=\"no\" data-eds-animate-on=\"hover\" data-eds-scroll-offset=\"\"><a href=\"\/en\/product\/by-operating-mode\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-312\" src=\"\/wp-content\/uploads\/2020\/06\/mode-promise-270x300.png\" alt=\"\" width=\"270\" height=\"300\" srcset=\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/mode-promise-270x300.png 270w, https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/mode-promise-768x854.png 768w, https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/mode-promise.png 849w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><\/a> <\/div><\/p>\n<\/div>\n<div>\n<p><div class=\"eds-animate  \" data-eds-entry-animation=\"pop\" data-eds-entry-delay=\"0\" data-eds-entry-duration=\"0.3\" data-eds-entry-timing=\"linear\" data-eds-exit-animation=\"\" data-eds-exit-delay=\"\" data-eds-exit-duration=\"\" data-eds-exit-timing=\"\" data-eds-repeat-count=\"1\" data-eds-keep=\"no\" data-eds-animate-on=\"hover\" data-eds-scroll-offset=\"\"><a href=\"\/en\/product\/by-operating-mode\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-312\" src=\"\/wp-content\/uploads\/2020\/06\/mode-saas-270x300.png\" alt=\"\" width=\"270\" height=\"300\" \/><\/a> <\/div><\/p>\n<\/div>\n<p><!-- {\"children\":[{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"\",\"vertical_align\":\"\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"top-right\",\"width_expand\":\"right\",\"animation\":\"slide-left-small\",\"image\":\"wp-content\\\/uploads\\\/2020\\\/09\\\/HEXAGONE_005.png\",\"image_visibility\":\"m\",\"padding_remove_bottom\":true,\"animation_delay\":true,\"image_width\":\"700\",\"header_transparent_noplaceholder\":false,\"css\":\".el-section img {\\nwidth:60%;}\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"large,expand\",\"width\":\"default\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_large\":\"2xlarge\"},\"children\":[{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"medium\",\"content\":\"<img  class=\\\"alignnone\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/fleche_retour.png\\\" alt=\\\"\\\" style=\\\"width:25px;\\\"  \\\/> <span style=\\\"font-size:0.7em;padding-left:5px\\\">Back<\\\/span>\",\"link\":\"en\\\/product\\\/by-type-of-service#s03\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"h1\",\"title_style\":\"heading-large\",\"content\":\"Data Value\",\"margin_remove_top\":true}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Consent management<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Processing purpose management<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Secure mass processing in compliance with data protection laws<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Secure mass processing performance<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"\",\"divider_align\":\"\",\"divider_align_breakpoint\":\"\",\"divider_align_fallback\":\"\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_style\":\"lead\",\"text_size\":\"large\",\"maxwidth\":\"xlarge\",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">The following are the different protection techniques used to ensure that sensitive personal data is not identified during mass processing:<\\\/p>\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_size\":\"large\",\"content\":\"\n\n<ul>\\n\n\n<li>Differential anonymization <\\\/li>\\n\n\n<li>Homomorphic encryption <\\\/li>\\n\n\n<li>Tokenisation and\\\/or deterministic encryption<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"content\":\"\n\n<div style=\\\"text-align: justify;\\\">The analysis processing of unencrypted data by authorised users only (Big Data Scientists, etc.) and within a defined period of time could also be a solution.<br \\\/><br \\\/><\\\/div>\\n\n\n<div style=\\\"text-align: justify;\\\">The purpose of the analysis processing and the consent of the data subjects concerned - if we are talking about sensitive personal data - will have been defined and obtained beforehand.<\\\/div>\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_large\":\"expand\"},\"children\":[{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_align\":\"center\",\"content\":\"\n\n<p>[edsanimate_start entry_animation_type= \\\"pop\\\" entry_delay= \\\"0\\\" entry_duration= \\\"0.3\\\" entry_timing= \\\"linear\\\" exit_animation_type= \\\"\\\" exit_delay= \\\"\\\" exit_duration= \\\"\\\" exit_timing= \\\"\\\" animation_repeat= \\\"1\\\" keep= \\\"no\\\" animate_on= \\\"hover\\\" scroll_offset= \\\"\\\" custom_css_class= \\\"\\\"]<a href=\\\"\\\/en\\\/product\\\/by-operating-mode\\\/\\\"><img class=\\\"alignnone size-medium wp-image-312\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/mode-promise-270x300.png\\\" alt=\\\"\\\" width=\\\"270\\\" height=\\\"300\\\" \\\/><\\\/a> [edsanimate_end]<\\\/p>\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_align\":\"center\",\"content\":\"\n\n<p>[edsanimate_start entry_animation_type= \\\"pop\\\" entry_delay= \\\"0\\\" entry_duration= \\\"0.3\\\" entry_timing= \\\"linear\\\" exit_animation_type= \\\"\\\" exit_delay= \\\"\\\" exit_duration= \\\"\\\" exit_timing= \\\"\\\" animation_repeat= \\\"1\\\" keep= \\\"no\\\" animate_on= \\\"hover\\\" scroll_offset= \\\"\\\" custom_css_class= \\\"\\\"]<a href=\\\"\\\/en\\\/product\\\/by-operating-mode\\\/\\\"><img class=\\\"alignnone size-medium wp-image-312\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/mode-saas-270x300.png\\\" alt=\\\"\\\" width=\\\"270\\\" height=\\\"300\\\" \\\/><\\\/a> [edsanimate_end]<\\\/p>\"}}]}]},{\"type\":\"row\",\"props\":{\"width\":\"default\",\"margin\":\"xlarge\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-1\"},\"children\":[]}]}],\"name\":\"Hero\"}],\"version\":\"2.2.5\",\"type\":\"layout\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back Data Value Consent management Processing purpose management Secure mass processing in compliance with data protection laws Secure mass processing performance The following are the different protection techniques used to ensure that sensitive personal data is not identified during mass processing: Differential anonymization Homomorphic encryption Tokenisation and\/or deterministic encryption The analysis processing of unencrypted data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2066,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2110","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Value - REGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Value - REGDATA\" \/>\n<meta property=\"og:description\" content=\"Back Data Value Consent management Processing purpose management Secure mass processing in compliance with data protection laws Secure mass processing performance The following are the different protection techniques used to ensure that sensitive personal data is not identified during mass processing: Differential anonymization Homomorphic encryption Tokenisation and\/or deterministic encryption The analysis processing of unencrypted data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/\" \/>\n<meta property=\"og:site_name\" content=\"REGDATA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-31T17:18:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/\",\"url\":\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/\",\"name\":\"Data Value - REGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/#website\"},\"datePublished\":\"2020-06-15T12:00:54+00:00\",\"dateModified\":\"2022-01-31T17:18:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.regdata.ch\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Product\",\"item\":\"https:\/\/www.regdata.ch\/en\/product\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"By Type of Service\",\"item\":\"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Value\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.regdata.ch\/en\/#website\",\"url\":\"https:\/\/www.regdata.ch\/en\/\",\"name\":\"REGDATA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.regdata.ch\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.regdata.ch\/en\/#organization\",\"name\":\"REGDATA SA\",\"url\":\"https:\/\/www.regdata.ch\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"contentUrl\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"width\":71,\"height\":71,\"caption\":\"REGDATA SA\"},\"image\":{\"@id\":\"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Value - REGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/","og_locale":"en_US","og_type":"article","og_title":"Data Value - REGDATA","og_description":"Back Data Value Consent management Processing purpose management Secure mass processing in compliance with data protection laws Secure mass processing performance The following are the different protection techniques used to ensure that sensitive personal data is not identified during mass processing: Differential anonymization Homomorphic encryption Tokenisation and\/or deterministic encryption The analysis processing of unencrypted data [&hellip;]","og_url":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/","og_site_name":"REGDATA","article_modified_time":"2022-01-31T17:18:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/","url":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/","name":"Data Value - REGDATA","isPartOf":{"@id":"https:\/\/www.regdata.ch\/en\/#website"},"datePublished":"2020-06-15T12:00:54+00:00","dateModified":"2022-01-31T17:18:25+00:00","breadcrumb":{"@id":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/data-value\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.regdata.ch\/en\/"},{"@type":"ListItem","position":2,"name":"Product","item":"https:\/\/www.regdata.ch\/en\/product\/"},{"@type":"ListItem","position":3,"name":"By Type of Service","item":"https:\/\/www.regdata.ch\/en\/product\/by-type-of-service\/"},{"@type":"ListItem","position":4,"name":"Data Value"}]},{"@type":"WebSite","@id":"https:\/\/www.regdata.ch\/en\/#website","url":"https:\/\/www.regdata.ch\/en\/","name":"REGDATA","description":"","publisher":{"@id":"https:\/\/www.regdata.ch\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.regdata.ch\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.regdata.ch\/en\/#organization","name":"REGDATA SA","url":"https:\/\/www.regdata.ch\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","contentUrl":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","width":71,"height":71,"caption":"REGDATA SA"},"image":{"@id":"https:\/\/www.regdata.ch\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/2110","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/comments?post=2110"}],"version-history":[{"count":15,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/2110\/revisions"}],"predecessor-version":[{"id":2584,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/2110\/revisions\/2584"}],"up":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/pages\/2066"}],"wp:attachment":[{"href":"https:\/\/www.regdata.ch\/en\/wp-json\/wp\/v2\/media?parent=2110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}